Secure processing of sensitive data

RCS systems are not currently audited to demonstrate compliance with common information security standards. Researchers with licenses to third-party datasets should clearly understand any restrictions and requirements placed upon them by the data provider, before using our systems for processing.